Beruflich Dokumente
Kultur Dokumente
M.Mohamed Sirajudeen et al., International Journal of Multidisciplinary in Cryptology and Information Security, 3 (5), SeptemberAvailable Online at http://warse.org/pdfs/2014/ijmcis01352014.pdf
October 2014, 27 - 30
ABSTRACT
Cloud computing technology is the modern trend in the
information technology era.
In general, the word
computing gives a meaning of evolution of an existing IT
infrastructure that provides a long-dreamed vision of
computing as a utility for the existing resources. The rapid
development of the cloud services and its technology to
play an inevitable role in the profit centric organizations.
Now-a-days more number of business firms utilizes the
cloud services in an effective and efficient manner. Due to
the more concern on the data transaction conducted by the
business organizations as well as more number of
government organizations bring an question mark for the
security. The way of data transaction for cloud computing
under different cloud models (such as Private, Public,
Hybrid, Community ).There will be a mechanism to
protect the data under each cloud by different security as
well as authentication algorithm. In this paper, mainly
focus on the security mechanism data transaction under the
private cloud by applying a special kind of cryptographic
authentication
algorithm
named
as
Orthogonal
Handshaking Authentication Protocol (OHSAP). After the
careful investigation reported by different private and
government sector [1], the architecture for OHSAP will be
proposed and discussed in this research architecture.
Key words:
authentication.
Cloud,
security,
orthogonal
and
1. INTRODUCTION
The utilization of existing services or recourses usually an
agreement between the service provider and the consumer.
27
M.Mohamed Sirajudeen et al., International Journal of Multidisciplinary in Cryptology and Information Security, 3 (5), September-October 2014, 27 - 30
IaaS
Private
PaaS
Public
SaaS
Hybrid
Community
2. RELATED WORK
Cloud Computing helps the service provider to switch
over from the traditional data center infrastructure to the
modern data datacenters in order to ensure more secure
transaction between the service provider and the
consumer. Despite its advantages, like on demand service,
pay-as-you-go, resource allocation, etc, there exist critical
security related vulnerabilities within the cloud computing
platform. Some of them are listed below: [12][13][17].
M.Mohamed Sirajudeen et al., International Journal of Multidisciplinary in Cryptology and Information Security, 3 (5), September-October 2014, 27 - 30
3. PROPOSED WORK
From the base paper entitled as Security Architecture for
cloud computing Platform written by the author
shanjaya Dahal, I have to choose two of the security
issues: Identity and Access Management and Data
protection.
Data Encryption
Partition of the encrypted data
REFERENCES
1. Ren, Kui, Cong Wang, and Qian Wang. "Security
challenges for the public cloud." Internet Computing,
IEEE 16.1 (2012): 69-73.
2. S. Subashini and V. Kavitha, "A Survey on Security
Minimal issues in service delivery models of cloud
computing Journal of Network and Computer
Applications, 34(1), 2011, pp 1-11
3. Sosinsky B, Cloud Computing Bible. 1st ed. Wiley;
2011.
4 .Kaufman, Lori M. "Can public-cloud security meet its
unique challenges?"Security & Privacy, IEEE 8.4 (2010):
55-57.
5. Guidelines on Security and Privacy in Public Cloud
Computing, NIST Special Publication 800-144
6.http://www.cloudsecurityalliance.org/guidance/csaguide.
v3.0.pdf
7.Catteddu, Daniele. "Cloud Computing: benefits, risks
and recommendations for information security." 2009
8.http://www.microsoft.com/presspass/press/2010/jan10/120BrookingsPR.mspx
9 .D. Talbot. Security in the Ether. Technology Review,
pages 3642
10. Hassan Takabi and James B.D.Joshi, Security and
Privacy Challenges in Cloud Computing Environments,
ME +EK or ME - EK
Locate the cloud server for
ME
Data/Information
Client
29
M.Mohamed Sirajudeen et al., International Journal of Multidisciplinary in Cryptology and Information Security, 3 (5), September-October 2014, 27 - 30
30